SlideShare a Scribd company logo
by Scott M. Ligocki Jr.  Computer Ethics
Computer Ethics is a branch of practical philosophy which deals with how computing professionals should make decisions regarding professional and social conduct online.  Ethical decisions related to computer technology and usage can typically be categorized into 3 primary influences: The individual’s own personal code.  Any informal code of ethical behavior that exists in the work place.  Exposure to formal code of ethics. The Beginning
To understand the foundation of Computer Ethics, it is important to examine the different schools of ethical theory.  Relativism - the understanding that there are no universal moral norms of right and wrong.  Kantianism - the belief that people’s actions are to be guided by moral laws, and that these moral laws are universal. Utilitarianism - the belief that an action is good if it benefits someone and an action is bad if it harms someone.  Social contract - the concept that for a society to arise and maintain order, a morality based set of rules must be agreed upon.  The Foundation
In 1950 Norbert Weiner, an MIT professor and inventor of an information feedback system called “Cybernetics", published a book called: The Human Use of Human Beings,which laid out the basic foundations of computer ethics and made Norbert Weiner the father of computer ethics.  The 1990's were a time when computers were reaching their pinnacle.  The combination of computers, with telecommunication, the internet and other media meant that many new ethical issues were being raised.  In the year 1992, the Association for Computing Machinery adopted a new set of ethical rules called: ACM Code of Ethics and Professional Conduct, which consisted of 24 statements of personal responsibility. The History
With the increase in social networking, more and more people are allowing their private information to be shared publicly. The power struggles of the real world have easily transferred onto the internet.  Independent users, businesses, and search engines are subject to manipulation, bias and censorship, whether they realize it or not.  This gives views to certain issues or events that may or may not be modified, which could easily bend public opinion in frightening ways.International news can spread across the globe in very little time.  The internet can easily be controlled by companies or organizations trying to get the public to buy in to certain things.  In reference to Computer Ethics, there is a lot to be said about Internet Privacy. The Internet
Computer EthicsIdentifying ethical issues as they arise, as well as defining how to deal with them.

More Related Content

PPTX
Computer ethics
PPTX
Computer Ethics
PPTX
COMPUTER ETHICS
PPTX
Computer Ethics Final Work
PPTX
Computer ethics
PPTX
computer ethics slides
PPTX
Ethics for IT Professionals and IT Users
PPT
Ethics in using computer
Computer ethics
Computer Ethics
COMPUTER ETHICS
Computer Ethics Final Work
Computer ethics
computer ethics slides
Ethics for IT Professionals and IT Users
Ethics in using computer

What's hot (20)

PPTX
Identify ethical use of computers
PPTX
Cyber crime, cyber law and cyber ethics
PPT
Ethics in it
PPT
Computer ethics
PPTX
Indian Cyber laws
PPT
Computer Ethics
PPTX
Computer ethics
PDF
Computer ethics
PPTX
Ethical Dilemmas/Issues in CyberWorld
PPT
BCS ethical dilemmas
PPTX
Computer ethics & copyright
PPT
Computer Ethics Presentation
PPTX
computer ethics
PPTX
Cyber forensics ppt
PPTX
Ethical hacking
PPTX
computer ethics.pptx
PPTX
Cyber security
PPTX
Ethics in computing
PDF
Fraud in igaming 101
PDF
資安健檢因應配套
Identify ethical use of computers
Cyber crime, cyber law and cyber ethics
Ethics in it
Computer ethics
Indian Cyber laws
Computer Ethics
Computer ethics
Computer ethics
Ethical Dilemmas/Issues in CyberWorld
BCS ethical dilemmas
Computer ethics & copyright
Computer Ethics Presentation
computer ethics
Cyber forensics ppt
Ethical hacking
computer ethics.pptx
Cyber security
Ethics in computing
Fraud in igaming 101
資安健檢因應配套
Ad

Viewers also liked (20)

PPTX
Software engineering-codes-of-ethics (1)
PPT
Ethics And Computing
PPT
Sis 2008
PPTX
Utility Players: A Library's Research Services Easily Integrate into Translat...
PPTX
Five laws of Library Science by S R Ranganathan
PPTX
Ethical vs non ethical marketing
PPT
S R Ranganathan Powerpoint
PPT
PDF
Computer Generations
PPTX
Importance of Ethics
PPTX
Laws of library science
PPT
Sears Subject Headings
PPTX
Collection development: selection Context, criteria on selection and electron...
PPT
Dealing with unethical behaviors in organizations
PPT
Comparative study of major classification schemes
PPT
Library Types & Personnel Roles
PPT
Ranganathan and Reference Service in the Modern Library
PPT
The Role of Libraries and Librarians in Information Literacy
PPT
Computer Ethics
PPT
Computer Ethics and Legal Issues
Software engineering-codes-of-ethics (1)
Ethics And Computing
Sis 2008
Utility Players: A Library's Research Services Easily Integrate into Translat...
Five laws of Library Science by S R Ranganathan
Ethical vs non ethical marketing
S R Ranganathan Powerpoint
Computer Generations
Importance of Ethics
Laws of library science
Sears Subject Headings
Collection development: selection Context, criteria on selection and electron...
Dealing with unethical behaviors in organizations
Comparative study of major classification schemes
Library Types & Personnel Roles
Ranganathan and Reference Service in the Modern Library
The Role of Libraries and Librarians in Information Literacy
Computer Ethics
Computer Ethics and Legal Issues
Ad

Similar to PPT Lab Assignment - Computers - Computer Ethics (20)

PPT
Introduction to modern computerethics.ppt
PDF
Computer ethics
PDF
Ict2 somehistoricalmilestone-ja barrientos
PPTX
Topic-2.2_InfoPrivacy-IT-Ethics.pptx
PDF
Globalcompose.com sample essay paper on cyber ethics
PDF
Globalcompose.com sample essay paper on cyber ethics
PPTX
Some Historical Milestone
PPTX
computer ethics
PPTX
Motivations behind Software Piracy: Relevance to Computer Ethics Theories
PPT
computerethics3333333333333333333333333333333333333333333.ppt
PPT
PPT
PPTX
a.pptx
PDF
Ijetcas14 345
PPTX
Introduction to ethics
PPTX
COMPUTER ETHICS
DOCX
Strategies for Answering Discussion and Essay Questions .docx
PPTX
Computer ethics
PDF
Information Technology and Social Justice 1st Edition Emma Rooksby
PPTX
Computer ethics & copyright
Introduction to modern computerethics.ppt
Computer ethics
Ict2 somehistoricalmilestone-ja barrientos
Topic-2.2_InfoPrivacy-IT-Ethics.pptx
Globalcompose.com sample essay paper on cyber ethics
Globalcompose.com sample essay paper on cyber ethics
Some Historical Milestone
computer ethics
Motivations behind Software Piracy: Relevance to Computer Ethics Theories
computerethics3333333333333333333333333333333333333333333.ppt
a.pptx
Ijetcas14 345
Introduction to ethics
COMPUTER ETHICS
Strategies for Answering Discussion and Essay Questions .docx
Computer ethics
Information Technology and Social Justice 1st Edition Emma Rooksby
Computer ethics & copyright

Recently uploaded (20)

PDF
Chapter 3 Spatial Domain Image Processing.pdf
PDF
Optimiser vos workloads AI/ML sur Amazon EC2 et AWS Graviton
PDF
Spectral efficient network and resource selection model in 5G networks
PDF
The Rise and Fall of 3GPP – Time for a Sabbatical?
PDF
TokAI - TikTok AI Agent : The First AI Application That Analyzes 10,000+ Vira...
PPTX
Machine Learning_overview_presentation.pptx
PDF
Encapsulation theory and applications.pdf
PDF
Approach and Philosophy of On baking technology
PDF
gpt5_lecture_notes_comprehensive_20250812015547.pdf
PDF
Network Security Unit 5.pdf for BCA BBA.
PDF
Architecting across the Boundaries of two Complex Domains - Healthcare & Tech...
PPTX
A Presentation on Artificial Intelligence
PPTX
Big Data Technologies - Introduction.pptx
PDF
Build a system with the filesystem maintained by OSTree @ COSCUP 2025
PDF
A comparative analysis of optical character recognition models for extracting...
PDF
Per capita expenditure prediction using model stacking based on satellite ima...
PPTX
MYSQL Presentation for SQL database connectivity
PDF
Electronic commerce courselecture one. Pdf
PDF
Diabetes mellitus diagnosis method based random forest with bat algorithm
PDF
Empathic Computing: Creating Shared Understanding
Chapter 3 Spatial Domain Image Processing.pdf
Optimiser vos workloads AI/ML sur Amazon EC2 et AWS Graviton
Spectral efficient network and resource selection model in 5G networks
The Rise and Fall of 3GPP – Time for a Sabbatical?
TokAI - TikTok AI Agent : The First AI Application That Analyzes 10,000+ Vira...
Machine Learning_overview_presentation.pptx
Encapsulation theory and applications.pdf
Approach and Philosophy of On baking technology
gpt5_lecture_notes_comprehensive_20250812015547.pdf
Network Security Unit 5.pdf for BCA BBA.
Architecting across the Boundaries of two Complex Domains - Healthcare & Tech...
A Presentation on Artificial Intelligence
Big Data Technologies - Introduction.pptx
Build a system with the filesystem maintained by OSTree @ COSCUP 2025
A comparative analysis of optical character recognition models for extracting...
Per capita expenditure prediction using model stacking based on satellite ima...
MYSQL Presentation for SQL database connectivity
Electronic commerce courselecture one. Pdf
Diabetes mellitus diagnosis method based random forest with bat algorithm
Empathic Computing: Creating Shared Understanding

PPT Lab Assignment - Computers - Computer Ethics

  • 1. by Scott M. Ligocki Jr. Computer Ethics
  • 2. Computer Ethics is a branch of practical philosophy which deals with how computing professionals should make decisions regarding professional and social conduct online. Ethical decisions related to computer technology and usage can typically be categorized into 3 primary influences: The individual’s own personal code. Any informal code of ethical behavior that exists in the work place. Exposure to formal code of ethics. The Beginning
  • 3. To understand the foundation of Computer Ethics, it is important to examine the different schools of ethical theory. Relativism - the understanding that there are no universal moral norms of right and wrong. Kantianism - the belief that people’s actions are to be guided by moral laws, and that these moral laws are universal. Utilitarianism - the belief that an action is good if it benefits someone and an action is bad if it harms someone. Social contract - the concept that for a society to arise and maintain order, a morality based set of rules must be agreed upon. The Foundation
  • 4. In 1950 Norbert Weiner, an MIT professor and inventor of an information feedback system called “Cybernetics", published a book called: The Human Use of Human Beings,which laid out the basic foundations of computer ethics and made Norbert Weiner the father of computer ethics. The 1990's were a time when computers were reaching their pinnacle. The combination of computers, with telecommunication, the internet and other media meant that many new ethical issues were being raised. In the year 1992, the Association for Computing Machinery adopted a new set of ethical rules called: ACM Code of Ethics and Professional Conduct, which consisted of 24 statements of personal responsibility. The History
  • 5. With the increase in social networking, more and more people are allowing their private information to be shared publicly. The power struggles of the real world have easily transferred onto the internet. Independent users, businesses, and search engines are subject to manipulation, bias and censorship, whether they realize it or not. This gives views to certain issues or events that may or may not be modified, which could easily bend public opinion in frightening ways.International news can spread across the globe in very little time. The internet can easily be controlled by companies or organizations trying to get the public to buy in to certain things. In reference to Computer Ethics, there is a lot to be said about Internet Privacy. The Internet
  • 6. Computer EthicsIdentifying ethical issues as they arise, as well as defining how to deal with them.